Question No: 71 – (Topic 1)

Question No: 72 – (Topic 1)

Which of the following is a source port forwarder and redirector tool?

Fpipe

NMAP

SuperScan

NSLOOKUP

Answer: A

Question No: 73 – (Topic 1)

Which of the following statements about Due Care policy is true?

It provides information about new viruses.

It is a method used to authenticate users on a network.

It identifies the level of confidentiality of information.

It is a method for securing database servers.

Answer: C

Question No: 74 – (Topic 1)

Which of the following methods backs up all changes made since the last full or normal backup?

Half backup

Incremental backup

Differential backup

Full backup

Answer: C

Question No: 75 – (Topic 1)

Which of the following statements about Discretionary Access Control List (DACL) is true?

It is a rule list containing access control entries.

It specifies whether an audit activity should be performed when an object attempts to access a resource.

It is a list containing user accounts, groups, and computers that are allowed (or denied) access to the object.

It is a unique number that identifies a user, group, and computer account.

Answer: C

Question No: 76 – (Topic 1)

Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?

Social engineering attack

Password guessing attack

Mail bombing

Cross site scripting attack

Answer: A

Question No: 77 – (Topic 1)

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

Dictionary attack

DDoS attack

Insertion attack

Evasion attack

Answer: B

Question No: 78 – (Topic 1)

Which of the following languages enable programmers to store cookies on client computers?

Each correct answer represents a complete solution. Choose two.

Perl

DHTML

JavaScript

HTML

Answer: A,C

Question No: 79 – (Topic 1)

Which of the following statement about eavesdropping is true?

It is a type of password guessing attack.

It is a way of preventing electronic emissions that are generated from a computer or network.

It is known as network saturation attack or bandwidth consumption attack.

It is the process of hearing or listening in private conversations.

Answer: D

Question No: 80 – (Topic 1)

You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?